
iDEA | Cyber Spies & Internet & Web
Authored by H Malaney
Computers
6th - 8th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does DDoS stand for?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is hacking?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Security Hole/Exploit?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name of the process that involves scrambling data into an unreadable format before sending so unauthorised recipients cannot access it?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of virus disguises itself as something else within code to avoid detection?
Spyware
Worm
Virus
Trojan Horse
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a black hat hacker do?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do white hat hackers differ to black hat hackers?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?